ABSTRACT

It is essential in our attempt to understand behavior patterns of cyberattackers or hackers to read what they have described as their motivations for embarking on the attacks that they have perpetrated. In this chapter, we collect a number of sources analyzing these personalities. First and foremost, and probably the richest collection to date, is abstracted from the book The Art of Intrusion, by Kevin Mitnick, one of the world's best-known hackers and now a security consultant, and his coauthor William Simon. This book is essential supplementary reading for students of the subject.